Distributed Systems Multicast & Group Communication Services
|
|
- Harriet Cobb
- 6 years ago
- Views:
Transcription
1 Distributed Systems Multicast & Group Communication Services Department of Computer Science The Johns Hopkins University 1 Multicast & Group Communication Services Lecture 3 Guide to Reliable Distributed Systems (Birman). Also: slides and resources can be found at: IP Multicast is documented in IETF RFC s and Internet-Drafts which can be found at: 2
2 The Multicast Paradigm a c P a a b c b d a P a P P P P P P Ordering (Unordered, FIFO, Causal, Agreed). Delivery guarantees (Unreliable, Reliable, Safe/Stable). Open groups versus close groups. Failure model (Omission, Fail-stop, Crash & Recovery, Network Partitions). Multiple groups. 3 Using Traditional Transport Protocols for Multicast Point to point (TCP/IP) Automatic flow control Reliable delivery Connection service 2 Complexity (n ) Linear (?) degradation in performance 4
3 Using Traditional Transport Protocols for Multicast (cont.) Unreliable broadcast/multicast (UDP, IP-Multicast) Employs hardware support for broadcast and multicast. Message losses : 0.01% at normal load, 10%, 20%, 30% or more at high load. Buffers overflow (in the network and in the OS). Interrupt misses. Not a connection-oriented service. 5 IP Multicast Multicast extension to IP. Best effort multicast service. No accurate membership. Class D addresses are reserved for multicast: to and are used as group addresses. The standard defines how hardware Ethernet multicast addresses can be used if these are possible. The Internet 6
4 IP-Multicast Logical Design Network 2 Network 1 The Internet 7 IP Multicast (cont.) Extensions to IP inside a host: A host may send IP multicast by using a multicast address as the destination address. A host manages a table of groups and local application processes that belong to this group. When a multicast message arrives at the host, it delivers copies of it to all of the local processes that belong to that group. A host acts as a member of a group only if it has at least one active process that joined that group. 8
5 IP Multicast Group Management Extensions to IP within one local area network The Internet Group Management Protocol (IGMP) A host that joins a group transmits a report message to IP multicast address (all hosts group) A multicast router sends periodic general query messages to discover IP multicast groups with local hosts to A host replies after setting a random timer for each group it is a member of The host sends a report message for that group only if no other host replied by the random timer expiration. 9 IP Multicast Group Management Extensions to IP within one local area network The Internet Group Management Protocol (IGMP) cont. When the host that replied last leaves the group, it sends a Leave Group message on IP multicast address (all routers group). The multicast router then sends a group specific query to check whether there are additional members in the group After a timeout with no positive host responses for a certain group, the IP Multicast router stops participating in that group (beyond the local area network) 10
6 IP-Multicast Routing Extensions to IP between routers in one network Distance Vector Multicast Routing Protocol (DVMRP, PIM-DM) Messages ABOUT groups are sent on the special all hosts group Time to live: limits the distance messages travel. Dense method: Flood & Prune. All routers get packets initially, then prune out parts of the network that do not have group member hosts. Tunneling: encapsulates multicast packets in regular packets in order to pass through routers that do not support IP Multicast. 11 IP-Multicast Routing (cont.) IP Multicast between routers in one network PIM-SM Sparse Method for better scalability only routers that participate, or are on the way to routers that participate, get IP multicast messages In contrast to Dense Method that employs Flood and Prune Utilizes rendezvous points for each group Rendezvous point router is determined via hashing the group address into a list of possible RP routers in the network (maintained by a bootstrap router) 12
7 IP-Multicast Routing(cont) PIM-SM (Sparse Method) Join Operation Join Request Join Confirm 13 IP-Multicast Routing(cont) IP Multicast between routers in one network MOSPF Extensions to Open Shortest Path First the link state routing protocol common in the Internet Group membership of local areas in the network is based on IGMP and is flooded between the routers on the network. Shortest path trees are calculated on demand for each source to each group (of destinations) it participates on Can work with inter-as Multicast Routing (MBGP+) to support IP Multicast operation beyond a single network (beyond an AS Autonomous System) 14
8 IP Multicast Challenges Scalability with the number of applications / groups. How many groups are needed on a world-wide basis? What happens to the core routers with many global groups? Turned off by ISPs. Can you think why? What can be done about that? 15 IP Multicast Challenges Scalability with the number of applications / groups. How many groups are needed on a world-wide basis? What happens to the core routers with many global groups? Turned off by ISPs. Can you think why? What can be done about that? Private networks using IP multicast e.g. for IPTV Overlay networks using unicast. 16
9 The Overlay Networks Approach Application-level routers working on top of a physical network. Overlay links consist of multiple physical links. Incurs overhead. Placement of overlay routers not optimal. Flexible use of peer-protocols. Provides added value. Actual node in the physical network Actual overlay network daemon Overlay network node Physical network link Physical link used by the overlay network Virtual overlay network link 17 Multicast Using Overlay Networks Routing is not optimal. But functional and does not require state at intermediate routers just at overlay routers. Multiple overlay networks can coexist in the Internet without overhead to Internet routers. All the multicast traffic is seen as unicast packets at the network level. No need for hardware support. Group names space extends only to the scope of the application (no longer global). 18
10 Reliable Multicast Services Service-Type S A F E A G R E E D C A U S A L Cost (latency) F I F O R E L I A B L E 19 Reliable Multicast Services (cont.) Fifo Order cause m --> m if send (m) --> send (m ) Causal Order cause m --> m if deliver (m) --> send (m ) Agreed Order q q - Total order - Consistent with Causal order and overlapping groups Safe Delivery - Consistent with Agreed order - Message is delivered after received by all processors 20 q * Not ordering q
11 Multicast Protocols Outline Vector Timestamps (ISIS System) Trans Protocol (used by Transis) Lamport Timestamps Single Ring Protocol (Totem) Accelerated Ring Protocol (Spread) 21 Vector Time Stamp: Reliability and Causal Ordering (ISIS system) Each process maintains a time vector of size n. Initially VT[i] = 0. When p sends a new message m: VT[p]++ Each message is stamped with VTm which is the current VT of the sender. When p delivers a message, p updates its vector: for k in 1..n: VTp[k] = max{ VTp[k], VTm[k] }. 22
12 Isis Causal Order (Cont) Comparing messages: VT1<VT2 iff for k= 1..n VT1[k] VT2[k] and k VT1[k]<VT2[k] Determining causality: m1 m2 iff VT1<VT2 Determining whether a message sent by q can be delivered: for any k in 1..n: VTm[k] = VT[k]+1 if k=q. VTm[k] VT[k] otherwise. 23 Example 1 p 1,0,0 0,1,0 Time q 0,1,0 1,0,0 r 0,1,0 1,0,0 Messages {1,0,0} and {0,1,0} are not causally related, so they can be delivered in any order 24
13 p Example 2 1,0,0 1,1,0 Time q 1,0,0 1,1,0 r 1,1,0 1,0,0 1,1,0 Message {1,0,0} causally precedes {1,1,0}, so {1,0,0} must be delivered before {1,1,0} 25 Example 3 p 1,0,0 1,1,0 0,0,1 Time q 1,0,0 1,1,0 0,0,1 r 1,1,0 0,0,1 1,0,0 1,1,0 A process does not update its timestamp until it delivers a message, so r sends {0,0,1}, even though it received {1,1,0} 26
14 Example 4 Time p 1,0,0 2,0,0 3,0,0 q 0,1,1 0,0,1 0,2,2 0,3,3 0,1,2 0,2,3 1,0,0 2,0,0 3,0,0 r 0,0,1 0,1,1 0,1,2 0,2,2 0,2,3 0,3,3 1,0,0 2,0,0 3,0,0 27 Example 4 Time p 1,0,0 2,0,0 3,0,0 0,1,1 0,2,2 0,3,3 0,0,1 0,1,2 0,2,3 q 0,1,1 0,0,1 0,2,2 0,3,3 0,1,2 0,2,3 1,0,0 2,0,0 3,0,0 r 0,0,1 0,1,1 0,1,2 0,2,2 0,2,3 0,3,3 1,0,0 2,0,0 3,0,0 28
15 Isis Agreed (Total) Order Preserves causality. From time to time, the token holder sends an ordering message for all the previous Agreed-order messages it knows that are not yet ordered. Non-token holders cannot deliver Causal messages that are causally after an Agreed message that is not yet ordered. A new token holder may be determined after a membership change. 29 Multicast Protocols Outline Vector Timestamps (ISIS System) Trans Protocol (used by Transis) Lamport Timestamps Single Ring Protocol (Totem) Accelerated Ring Protocol (Spread) 30
16 The Trans Protocol A B C D A Emits: A 1 A 2 A 3... Scenario: A a 1 B 1 b 1 B 2 b 2 C Direct Ack: a 1 B 1 A 1 Indirect Ack: b 2 C 1 A 1, B 1 31 Example Scenario: A B a b B a C c b C A 1 32
17 Example Scenario: A B a b B a C c b C A 1 B 1 33 Example Scenario: A B a b B a C c b C B 2 A 1 B 1 34
18 Example Scenario: A B a b B a C c b C C 1 B 2 A 1 B 1 35 Example Scenario: A B a b B a C c b C C 2 C 1 B 2 A 1 B 1 36
19 Example (Cont.) D received: A B a C c b C Nack:: c b b D C 2 D 1 C 1 B 2 A 1 B 1 37 The DAG The DAG may be revealed in a different way, but its structure will be identical at all the processors!! C 1 C 2 A 2 D 1 B 2 A 1 B 1 38
20 The DAG The DAG may be revealed in a different way, but its structure will be identical at all the processors!! C 1 C 2 A 2 D 1 Total order can be based on the structure of the graph A 1 B 1 B 2 39 Vector Timestamps vs DAG DAG is a compaction of a vector timestamp The DAG method is more efficient networkwise and can scale better with the number of participants However, the DAG requires maintaining a more sophisticated data structure 40
21 Flow Control P-2-P: Last Ack Stop 41 P-2-P: Flow Control Last Ack Stop Multicast? BOOM 42
22 Flow Control for Trans (from the Transis system) Multicast: Network Sliding Window Last All Ack Stop 43 Multicast Protocols Outline Vector Timestamps (ISIS System) Trans Protocol (used by Transis) Lamport Timestamps Single Ring Protocol (Totem) Accelerated Ring Protocol (Spread) 44
23 A Lamport Time Stamp Approach A Lamport Time Stamp (LTS) contains two fields: Counter. Process id. When sending a message. Increment your counter. Stamp your message. Send your message. When receiving a message Adopt the counter on the message if it is bigger than your local counter. Unique for every message. 45 A Lamport Time Stamp Approach A Lamport Time Stamp (LTS) contains two fields: Counter. Process id. When sending a message. Increment your counter. Stamp your message. Send your message. When receiving a message Adopt the counter on the message if it is bigger than your local counter. Unique for every message. It is useful to add an index next to the LTS, such that the index is incremented only when sending new messages. The index helps track how many messages were sent by a process as well as how many were missed from that process. 46
24 A Lamport Time Stamp Approach A Lamport Time Stamp (LTS) contains two fields: Counter. Process id. When sending a message. Increment your counter. Stamp your message. Send your message. When receiving a message Adopt the counter on the message if it is bigger than your local counter. Unique for every message. It is useful to add an index next to the LTS, such that the index is incremented only when sending new messages. The index helps track how many messages were sent by a process as well as how many were missed from that process. Agreed order of messages can be achieved by comparing (counter, process id) on message. FIFO and Causal order as a by-product. 47 Multicast Protocols Outline Vector Timestamps (ISIS System) Trans Protocol (used by Transis) Lamport Timestamps Single Ring Protocol (Totem) Accelerated Ring Protocol (Spread) 48
25 The Single Ring Protocol (Totem) The communication is multicast (UDP/IP). Services: Agreed (which is also FIFO and Causal), Safe. supports message omissions, network partitions, crashes and recoveries. 49 The Ring Ordering Scheme Token fields type - {regular, form}. seq - of last message. aru - replaces acks. rtr - retrans. requests fcc - flow control. 50
26 The Ring Ordering Scheme (cont) How to update the token aru? If token.aru = token.seq and have all the messages then should raise aru together with the seq (when sending new messages). If the token.aru is higher than the highest in-order message (local aru), lower the token.aru to the local aru. If is the one that lowered the aru, and the token.aru is still the same, should set token.aru to its local aru. The trick: Everyone has all the messages up to: min( token.aru, previous token.aru) 51 Multicast Protocols Outline Vector Timestamps (ISIS System) Trans Protocol (used by Transis) Lamport Timestamps Single Ring Protocol (Totem) Accelerated Ring Protocol (Spread) 52
27 Accelerated Ring Protocol Original Ring Protocol Token is passed around a ring of participants A participant multicasts while it holds the token, then passes the token to the next participant Accelerated Ring Protocol Participants pass the token while multicasting Circulates the token faster, allowing more rounds of sending per second Allows controlled parallelism, while maintaining semantics Designed for modern data centers 53 Accelerated Ring Protocol A" 1% 2% 3% 4% 5% 5% 16% 17% 18% 19% 20% 20% B" 6% 7% 8% 9% 10% 10% C" 11% 12% 13% 14% 15% 15% Time% Original Protocol A" 1% 2% 5% 3% 4% 5% 16% 17% 20% 18% 19% 20% B" 6% 7% 10% 8% 9% 10% C" 11% 12% 15% 13% 14% 15% Time% Accelerated Protocol 54
28 Accelerated Ring Protocol Updating token fields seq Original: sequence number of last message sent Accelerated: last sequence number claimed (message will be sent by the time the next token is processed) rtr - how do you decide what to request? Original: request any missing messages with sequence numbers less than seq Accelerated: request any missing messages with sequence numbers less than the value of seq on the token received in the previous round seq may reflect messages that are still on their way or even not yet sent; you don t want to request them unless they are really lost 55 1G Network Results Latency((ms)( 4.5" 4" 3.5" 3" 2.5" 2" 1.5" 1" Simultaneously improves throughput by 60% and latency by 45% 500 Mbps, 1.3 ms latency 800 Mbps, 0.72 ms latency Original"Spread" Original" Daemon9based" Original"Library9 based" Accelerated" Spread" Accelerated" Daemon9based" 0.5" Accelerated" Library9based" 0" 0" 200" 400" 600" 800" 1000" 1200" Agreed(Delivery(Throughput((Mbps)( 56
29 10G Network Results Latency(((ms)( 1.4" 1.2" 1" 0.8" 0.6" 0.4" Spread Original: 1 Gbps, ms latency Simultaneously improves throughput by 20% and latency by 20% Spread Accelerated: 1.2 Gbps, 0.31 ms latency 0.2" 0" 0" 1000" 2000" 3000" 4000" 5000" Agreed(Delivery(Throughput((Mbps)( 57 10G Network Results Latency(((ms)( 1.4" 1.2" 1" 0.8" 0.6" 0.4" Daemon- based Original: 2 Gbps, 0.39 ms latency Simultaneously improves throughput by 40% and latency by 30% Daemon- based Accelerated: 2.8 Gbps, ms latency 0.2" 0" 0" 1000" 2000" 3000" 4000" 5000" Agreed(Delivery(Throughput((Mbps)( 58
30 10G Network Results Latency(((ms)( 1.4" 1.2" 1" 0.8" 0.6" 0.4" 0.2" Library- based Original: 2.57 Gbps, ms latency Simultaneously improves throughput by 35% and latency by 30% Library- based Accelerated: 3.5 Gbps, 0.23 ms latency 0" 0" 1000" 2000" 3000" 4000" 5000" Agreed(Delivery(Throughput((Mbps)( 59 10G Network Results Latency(((ms)( 1.4" 1.2" 1" 0.8" 0.6" 0.4" 0.2" Library- based Original: 2.57 Gbps, ms latency Simultaneously improves throughput by 35% and latency by 30% Library- based Accelerated: 3.5 Gbps, 0.23 ms latency 0" 0" 1000" 2000" 3000" 4000" 5000" Agreed(Delivery(Throughput((Mbps)( 60
31 Latency((ms)( 1.4" 1.2" 1" 0.8" 0.6" 0.4" 10G Network Results Spread: 5.2 Gbps (8850- byte msgs) Daemon- based: 6 Gbps (8850- byte msgs) Library- based: 7.3 Gbps (8850- byte msgs) 0.2" 0" 0" 2000" 4000" 6000" 8000" Agreed(Delivery(Throughput((Mbps)( 61 10G Network Results with Loss (480 Mbps) Average'Latecny'(ms)' 3" 2.5" 2" 1.5" 1" 0.5" Accelerated Protocol Original Protocol * Lower line = beper latency Safe Delivery Worst 5% Safe Delivery Agreed Delivery Worst 5% 0" 0" 5" 10" 15" 20" 25" Loss'Rate'at'Each'Daemon'(%)' Agreed Delivery 62
32 Failure Models Possible faults: Message omissions and delays Processor crashes and recoveries Network partitions and re-merges Most of the time it is assumed that: Message corruption is detected There are no malicious faults 63 Transis Membership Algorithm Utilizes hardware broadcast Ordering and Reliability optimized by DAG Handles crashes and recoveries. Handles network partitions and merges. Terminates in a bounded time (to do that, it allows the extraction of live but inactive processors). Guarantees extended virtual synchrony (relationship between messages and membership events). 64
33 Transis Membership (cont.) Partitioning / crashes detection Timeout: invoked by timeout. Merging Symmetric: no joining-side, accepting-side Spontaneous: invoked after receiving Join messages or foreign messages. Faults may occur at any time (even while merging). 65 Faults & Partitions When Detecting a processor from which we did not hear for a certain timeout : we issue a fault message. FA(p) FA(p) When we get a fault message, we adopt it (and issue our copy). FA(p) FA(p) Problem: maybe p is only slow. 66
34 The Problem When a partition occurs, we cannot always completely determine who received which messages. It is proven that there is no solution to this problem (no common knowledge) 67 Merges time join (A,B,C) join (A,B) join (A,B,C) join (A,B,C) join (B,C) A B C 68
35 The Single Ring Protocol Membership has several stages: Detect that old membership is lost. Gather together all alive members. Form a new ring and send old state. Transfer missing messages. Install new membership. Supports message omissions, network partitions, crashes and recoveries. 69 Membership Events Foreign Message. Attempt join/ Join. Gather timeout. Commit timeout. Form token. Token loss timeout. States Operational state. Gather state. Commit state. Form state. Recover state. 70
36 Token loss timeout Gather Foreign Message Membership (cont) Token loss timeout Operational Token loss timeout Extended Virtual Synchrony Recover Attempt Join OR Join Gather timeout Commit timeout Token loss timeout Join message AND consensus AND representative Form token AND NOT representative Form token AND representative Form token Commit Form token Form Join Message Token loss AND NOT timeout (Consensus AND Representative) 71 Membership (cont..) Representatives are shown shaded 72
CSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 12 Internet Routing: Multicast Today: Multicast routing Multicast service model Host interface Host-router interactions (IGMP) Multicast Routing Limiters
More informationMulticast Communications
Multicast Communications Multicast communications refers to one-to-many or many-tomany communications. Unicast Broadcast Multicast Dragkedja IP Multicasting refers to the implementation of multicast communication
More informationICS 351: Today's plan. routing protocol comparison encapsulation network dynamics multicasting in general IP multicasting IGMP PIM
ICS 351: Today's plan routing protocol comparison encapsulation network dynamics multicasting in general IP multicasting IGMP PIM what routing is not: Ethernet switching does not use IP addresses in any
More informationMulticast service model Host interface Host-router interactions (IGMP) Multicast Routing Distance Vector Link State. Shared tree.
CSE 123A Computer Networks Fall 2009 Lecture 10 Internet Routing: Multicast Today: Multicast routing Multicast service model Host interface Host-router interactions (IGMP) Multicast Routing Distance Vector
More informationMulticast Communications. Slide Set were original prepared by Dr. Tatsuya Susa
Multicast Communications Slide Set were original prepared by Dr. Tatsuya Susa Outline 1. Advantages of multicast 2. Multicast addressing 3. Multicast Routing Protocols 4. Multicast in the Internet 5. IGMP
More informationProcess groups and message ordering
Process groups and message ordering If processes belong to groups, certain algorithms can be used that depend on group properties membership create ( name ), kill ( name ) join ( name, process ), leave
More informationETSF10 Internet Protocols Routing on the Internet
ETSF10 Internet Protocols Routing on the Internet 2012, Part 2, Lecture 1.2 Kaan Bür, Jens Andersson Routing on the Internet Unicast routing protocols (part 2) [ed.4 ch.22.4] [ed.5 ch.20.3] Forwarding
More informationLecture 19: Multicast. CSE 123: Computer Networks Stefan Savage
Lecture 19: Multicast CSE 123: Computer Networks Stefan Savage Today: Multicast routing Multicast service model Host interface Host-router interactions (IGMP) Multicast outing Limiters Distance Vector
More informationASM. Engineering Workshops
1 ASM 2 ASM Allows SPTs and RPTs RP: Matches senders with receivers Provides network source discovery Typically uses RPT to bootstrap SPT RPs can be learned via: Static configuration recommended Anycast-RP
More informationWhat is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals
What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting
More informationList of groups known at each router. Router gets those using IGMP. And where they are in use Where members are located. Enhancement to OSPF
Multicast OSPF OSPF Open Shortest Path First Link State Protocol Use Dijkstra s algorithm (SPF) Calculate shortest path from the router to every possible destination Areas Limit the information volume
More informationETSF10 Internet Protocols Routing on the Internet
ETSF10 Internet Protocols Routing on the Internet 2014, Part 2, Lecture 1.2 Jens Andersson Internet Hierarchy 2014-11-10 ETSF05/ETSF05/ETSF10 - Internet Protocols 2 Hierarchical Routing aggregate routers
More information2017 Paul Krzyzanowski 1
Question 1 What problem can arise with a system that exhibits fail-restart behavior? Distributed Systems 06. Exam 1 Review Stale state: the system has an outdated view of the world when it starts up. Not:
More informationContents. Overview Multicast = Send to a group of hosts. Overview. Overview. Implementation Issues. Motivation: ISPs charge by bandwidth
EECS Contents Motivation Overview Implementation Issues Ethernet Multicast IGMP Routing Approaches Reliability Application Layer Multicast Summary Motivation: ISPs charge by bandwidth Broadcast Center
More informationMulticast EECS 122: Lecture 16
Multicast EECS 1: Lecture 16 Department of Electrical Engineering and Computer Sciences University of California Berkeley Broadcasting to Groups Many applications are not one-one Broadcast Group collaboration
More informationETSF10 Internet Protocols Routing on the Internet
ETSF10 Internet Protocols Routing on the Internet 2013, Part 2, Lecture 1.2 Jens Andersson (Kaan Bür) Routing on the Internet Unicast routing protocols (part 2) [ed.5 ch.20.3] Multicast routing, IGMP [ed.5
More informationWhy multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions
Tuomo Karhapää tuomo.karhapaa@otaverkko.fi Otaverkko Oy Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions
More informationChapter 3 A New Framework for Multicast Mobility in WiFi Networks
Chapter 3 A New Framework for Multicast Mobility in WiFi Networks 3.1 Introduction This chapter presents the designed framework that was produced during this research. The chapter describes about network
More informationAdvanced Network Training Multicast
Division of Brocade Advanced Network Training Multicast Larry Mathews Systems Engineer lmathews@brocade.com Training Objectives Session will concentrate on Multicast with emphasis on Protocol Independent
More informationNetwork Layer II. Getting IP addresses. DHCP client-server scenario. DHCP client-server scenario. C compiler. You writing assignment 2
Network Layer II Still chapter 4 in the textbook C compiler You writing assignment 2 Getting IP addresses ARP is the simplest way, which we will barely discuss (now) It s a mapping between Ethernet MAC
More informationDeveloping IP Muiticast Networks
Developing IP Muiticast Networks Volume I Beau Williamson Cisco SYSTEMS CISCO PRESS Cisco Press 201 West 103rd Street Indianapolis, IN 46290 USA Table of Contents Introduction xviii Part I Fundamentals
More informationTopic: Multicast routing
Topic: Multicast routing What you will learn Broadcast routing algorithms Multicasting IGMP Multicast routing algorithms Multicast routing in the Internet Multicasting 1/21 Unicasting One source node and
More informationDa t e: August 2 0 th a t 9: :00 SOLUTIONS
Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,
More informationTable of Contents 1 PIM Configuration 1-1
Table of Contents 1 PIM Configuration 1-1 PIM Overview 1-1 Introduction to PIM-DM 1-2 How PIM-DM Works 1-2 Introduction to PIM-SM 1-4 How PIM-SM Works 1-5 Introduction to Administrative Scoping in PIM-SM
More informationDD2490 p IP Multicast routing. Multicast routing. Olof Hagsand KTH CSC
DD2490 p4 2010 IP Multicast routing Multicast routing Olof Hagsand KTH CSC 1 Literature RFC 4601 Section 3 (you may need some definitions from Section 2). See reading instructions on web. 2 Deployment
More informationConfiguring IP Multicast Routing
39 CHAPTER This chapter describes how to configure IP multicast routing on the Catalyst 3560 switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive
More informationMulticast routing Draft
Multicast routing Draft Lucia Tudose Nokia Research Center E-mail: tudose@research.nokia.com Abstract Multicast routing is establishing a tree which is routed from the source node and contains all the
More informationAdvanced Networking. Multicast
Advanced Networking Multicast Renato Lo Cigno Renato.LoCigno@dit.unitn.it Homepage: disi.unitn.it/locigno/index.php/teaching-duties/advanced-networking Multicasting Addresses that refer to group of hosts
More informationIP Multicast: Does It Really Work? Wayne M. Pecena, CPBE, CBNE
IP Multicast: Does It Really Work? Wayne M. Pecena, CPBE, CBNE Texas A&M Information Technology Educational Broadcast Services - KAMU v2 Agenda Introduction IP Networking Review The Multicast Group Multicast
More informationHow did IP Multicast get so complicated?
How did IP Multicast get so complicated? Mark Handley ACIRI mjh@aciri.org Overview IP Multicast Service Model Multicast Addresses DVMRP (1988-1993) Broadcast and Prune PIM-DM (~1993) DVMRP for "real" routers
More informationMulticast Technology White Paper
Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission
More informationConfiguring IP Multicast Routing
34 CHAPTER This chapter describes how to configure IP multicast routing on the Cisco ME 3400 Ethernet Access switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive
More informationInternet Protocols Fall Lectures Inter-domain routing, mobility support, multicast routing Andreas Terzis
Internet Protocols Fall 2006 Lectures 11-12 Inter-domain routing, mobility support, multicast routing Andreas Terzis Outline Inter-domain Internet Routing BGP Routing for mobile nodes Multicast routing
More informationIntroduction to Networks and the Internet
Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.
More informationMulticast routing protocols
Multicast routing protocols IGMP IP Group Management Protocol PIM Protocol Independent Multicast MOSPF Multicast OSPF DVMRP DV Multicast Routing Protocol E7310-Multicast-2/Comnet 1 Multicast in local area
More informationIP Multicast. What is multicast?
IP Multicast 1 What is multicast? IP(v4) allows a host to send packets to a single host (unicast), or to all hosts (broadcast). Multicast allows a host to send packets to a subset of all host called a
More informationInternetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
More information4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or
CS475 Networks Lecture 14 Chapter 4 Advanced Internetworking Assignments Reading for Lecture 15: Sections 5.1-5.2 Homework 5, Wireshark Project 3 posted, due next Thursday; Programming Project 3 posted,
More informationIPv6 PIM. Based on the forwarding mechanism, IPv6 PIM falls into two modes:
Overview Protocol Independent Multicast for IPv6 () provides IPv6 multicast forwarding by leveraging static routes or IPv6 unicast routing tables generated by any IPv6 unicast routing protocol, such as
More informationMulticast overview. Introduction to multicast. Information transmission techniques. Unicast
Contents Multicast overview 1 Introduction to multicast 1 Information transmission techniques 1 Multicast features 3 Common notations in multicast 4 Multicast benefits and applications 4 Multicast models
More informationDistributed Systems. Pre-Exam 1 Review. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems Pre-Exam 1 Review Paul Krzyzanowski Rutgers University Fall 2015 October 2, 2015 CS 417 - Paul Krzyzanowski 1 Selected Questions From Past Exams October 2, 2015 CS 417 - Paul Krzyzanowski
More informationBroadcast Routing. Multicast. Flooding. In-network duplication. deliver packets from source to all other nodes source duplication is inefficient:
Broadcast Routing Multicast deliver packets from source to all other nodes source duplication is inefficient: duplicate duplicate creation/transmission duplicate source duplication in-network duplication
More informationCSCE 463/612 Networks and Distributed Processing Spring 2018
CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer V Dmitri Loguinov Texas A&M University April 17, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross Chapter 4:
More informationDifferent Layers Lecture 20
Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,
More informationModule 7 Implementing Multicast
Module 7 Implementing Multicast Lesson 1 Explaining Multicast Why Multicast? Used when sending same data to multiple receivers Better bandwidth utilization Less host/router processing Used when addresses
More informationNetwork Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2011
Network Security: Broadcast and Multicast Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2011 Outline 1. Broadcast and multicast 2. Receiver access control (i.e. data confidentiality)
More informationChapter 09 Network Protocols
Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems
More informationMulticast overview. Introduction to multicast. Information transmission techniques. Unicast
Contents Multicast overview 1 Introduction to multicast 1 Information transmission techniques 1 Multicast features 3 Common notations in multicast 4 Multicast advantages and applications 4 Multicast models
More informationMulticast as an ISP service
Multicast as an ISP service Lecture slides for S-38.3192 15.2.2007 Mika Ilvesmäki Networking laboratory Goals of this lecture After this lecture you will be able to Give an overall technical view of multicast
More informationIPv6 and Multicast. Outline. IPv6 Multicast. S Computer Networks - Spring 2005
IPv6 and Multicast 188lecture5.ppt Pasi Lassila 1 Outline IPv6 Multicast 2 IPv6 overview Motivation Internet growth (address space depletion and routing information eplosion) CIDR has helped but eventually
More informationCSE 5306 Distributed Systems
CSE 5306 Distributed Systems Fault Tolerance Jia Rao http://ranger.uta.edu/~jrao/ 1 Failure in Distributed Systems Partial failure Happens when one component of a distributed system fails Often leaves
More informationIP Multicast Optimization: Optimizing PIM Sparse Mode in a Large IP Multicast Deployment
IP Multicast Optimization: Optimizing PIM Sparse Mode in a Large IP Multicast Deployment Finding Feature Information, page 1 Prerequisites for Optimizing PIM Sparse Mode in a Large IP Multicast Deployment,
More informationFault Tolerance. Distributed Systems. September 2002
Fault Tolerance Distributed Systems September 2002 Basics A component provides services to clients. To provide services, the component may require the services from other components a component may depend
More informationConfiguring a Rendezvous Point
Version History Version Number Date Notes 1 03/15/2002 This document was created. The purpose of this document is to outline four recommended methods for configuring a rendezvous point (RP) in a Protocol
More informationCSE 5306 Distributed Systems. Fault Tolerance
CSE 5306 Distributed Systems Fault Tolerance 1 Failure in Distributed Systems Partial failure happens when one component of a distributed system fails often leaves other components unaffected A failure
More informationBroadcast and Multicast Routing
Broadcast and Multicast Routing Daniel Zappala CS 460 Computer Networking Brigham Young University Group Communication 2/34 How can the Internet provide efficient group communication? send the same copy
More informationCS505: Distributed Systems
Cristina Nita-Rotaru CS505: Distributed Systems Protocols. Slides prepared based on material by Prof. Ken Birman at Cornell University, available at http://www.cs.cornell.edu/ken/book/ Required reading
More informationHands-On IP Multicasting for Multimedia Distribution Networks
Hands-On for Multimedia Distribution Networks Course Description This Hands-On course provides an in-depth look how IP multicasting works, its advantages and limitations and how it can be deployed to provide
More informationIP Multicast. Falko Dressler Regionales Rechenzentrum Grundzüge der Datenkommunikation IP Multicast
Falko Dressler Regionales Rechenzentrum falko.dressler@rrze.uni-erlangen.de 1 Agenda Basics Principles of IP multicast, addressing, TTL Internet Group Management Protocol (IGMP) IGMPv1, v2, v3 Layer-2
More informationPIM Configuration. Page 1 of 9
PIM Configuration Page 1 of 9 Contents Contents...2 Chapter 1 PIM Configuration...3 1.1 PIM Description...3 1.1.1 Principles of PIM-DM...3 1.1.2 Principles of PIM-SM...4 1.1.3 Principles of PIM-SSM...5
More informationAnniversary Retrospective: Where Multicast Has Been & Where It s Headed.
Anniversary Retrospective: Where Multicast Has Been & Where It s Headed Agenda Origins of Multicast Dating back to late 80s Requirements from the early 1990s Protocol Generation Evolution
More informationAdvanced Networking. Multicast
Advanced Networking Multicast Renato Lo Cigno Alessandro Russo LoCigno@disi.unitn.it - Russo@disi.unitn.it Homepage: disi.unitn.it/locigno/index.php/teaching-duties/advanced-networking The Multicast Tree
More informationRandomization. Randomization used in many protocols We ll study examples:
Randomization Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling 1 Ethernet Single shared broadcast channel 2+ simultaneous
More informationRandomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling
Randomization Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling 1 Ethernet Single shared broadcast channel 2+ simultaneous
More informationInternet Multicast Routing
Internet Multicast Routing. group addressing class D IP addresses 1110 Multicast Group ID. link layer multicast 28 bits. two protocol functions group management IGMP route establishment DVMRP, MOSPF, CBT,
More informationIP Multicast. Overview. Casts. Tarik Čičić University of Oslo December 2001
IP Multicast Tarik Čičić University of Oslo December 00 Overview One-to-many communication, why and how Algorithmic approach (IP) multicast protocols: host-router intra-domain (router-router) inter-domain
More informationLecture 6: Multicast
Lecture 6: Multicast Challenge: how do we efficiently send messages to a group of machines? Need to revisit all aspects of networking Last time outing This time eliable delivery Ordered delivery Congestion
More informationIP Multicast Technology Overview
IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take
More informationNetworking Acronym Smorgasbord: , DVMRP, CBT, WFQ
Networking Acronym Smorgasbord: 802.11, DVMRP, CBT, WFQ EE122 Fall 2011 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other
More informationChapter 24 PIM Commands
Chapter 24 PIM Commands bsr-candidate Configures the Routing Switch as a candidate PIM Sparse Bootstrap Router (BSR). To configure the Routing Switch as a candidate BSR, enter a command such as the following:
More informationExercises to Communication Systems
Exercises to Communication Systems IP Multicast Additional Slides Dr.-Ing. Falko Dressler Department of Computer Science 7 University of Erlangen ÜKS, WS 05/06 1 IP Multicast Introduction Internet Group
More informationCS 268: IP Multicast Routing
Motivation CS 268: IP Multicast Routing Ion Stoica April 8, 2003 Many applications requires one-to-many communication - E.g., video/audio conferencing, news dissemination, file updates, etc. Using unicast
More informationInternet2 Multicast Workshop
Internet2 Multicast Workshop University of British Columbia Vancouver, BC May, 2004 Acknowledgements Greg Shepherd Beau Williamson Marshall Eubanks Bill Nickless Caren Litvanyi Patrick Dorn Leonard Giuliano
More informationLecture 6: Multicast
Lecture 6: Multicast Challene: how do we efficiently send messaes to a roup of machines? Need to revisit all aspects of networkin Routin Autonomous systems and admin control Address allocation Conestion
More informationLecture 6. TCP/IP Network Layer (4)
Lecture 6 TCP/IP Network Layer (4) Outline (Network Layer) Principles behind network layer services: Virtual circuit and datagram networks Routing algorithms Link State Distance Vector Hierarchical Routing
More informationMULTICAST EXTENSIONS TO OSPF (MOSPF)
MULTICAST EXTENSIONS TO OSPF (MOSPF) Version 2 of the Open Shortest Path First (OSPF) routing protocol is defined in RFC-1583. It is an Interior Gateway Protocol (IGP) specifically designed to distribute
More informationFault Tolerance. Basic Concepts
COP 6611 Advanced Operating System Fault Tolerance Chi Zhang czhang@cs.fiu.edu Dependability Includes Availability Run time / total time Basic Concepts Reliability The length of uninterrupted run time
More informationTHE TRANSPORT LAYER UNIT IV
THE TRANSPORT LAYER UNIT IV The Transport Layer: The Transport Service, Elements of Transport Protocols, Congestion Control,The internet transport protocols: UDP, TCP, Performance problems in computer
More informationChapter 19 Network Layer: Logical Addressing
Chapter 19 Network Layer: Logical Addressing 19.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 19.2 19-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address
More informationCoordination 2. Today. How can processes agree on an action or a value? l Group communication l Basic, reliable and l ordered multicast
Coordination 2 Today l Group communication l Basic, reliable and l ordered multicast How can processes agree on an action or a value? Modes of communication Unicast 1ç è 1 Point to point Anycast 1è
More informationIPv6 PIM-DM configuration example 36 IPv6 PIM-SM non-scoped zone configuration example 39 IPv6 PIM-SM admin-scoped zone configuration example 42 IPv6
Contents Configuring IPv6 PIM 1 Overview 1 IPv6 PIM-DM overview 1 IPv6 PIM-SM overview 3 IPv6 BIDIR-PIM overview 8 IPv6 administrative scoping overview 11 IPv6 PIM-SSM overview 13 Relationship among IPv6
More informationMulticast. Introduction Group management Routing Real-time transfer and control protocols Resource reservation Session management MBone
Multicast Introduction Group management Routing Real-time transfer and control protocols Resource reservation Session management MBone Petri Vuorimaa 1 Introduction There are three ways to transport data
More informationChapter 8 Fault Tolerance
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 8 Fault Tolerance 1 Fault Tolerance Basic Concepts Being fault tolerant is strongly related to
More informationChapter 12 Network Protocols
Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)
More informationObjectives. Chapter 10. Upon completion you will be able to:
Chapter 10 Figure 10.1 Position of IGMP in the network layer Objectives Upon completion you will be able to: Know the purpose of IGMP Know the types of IGMP messages Understand how a member joins a group
More informationExample questions for the Final Exam, part A
ETSF10, ETSF05 Ht 2010 Example questions for the Final Exam, part A 1. In AdHoc routing there are two main strategies, reactive and proactive routing. Describe in a small number of words the concept of
More informationHomework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca
CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationCHAPTER 4: INTERPROCESS COMMUNICATION AND COORDINATION
CHAPTER 4: INTERPROCESS COMMUNICATION AND COORDINATION Chapter outline Discuss three levels of communication: basic message passing, request/reply and transaction communication based on message passing
More informationFailure Tolerance. Distributed Systems Santa Clara University
Failure Tolerance Distributed Systems Santa Clara University Distributed Checkpointing Distributed Checkpointing Capture the global state of a distributed system Chandy and Lamport: Distributed snapshot
More informationConfiguring Basic IP Multicast
IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of corporate businesses and homes. Applications
More informationDistributed Systems (5DV020) Group communication. Fall Group communication. Fall Indirect communication
Distributed Systems (5DV020) Group communication Fall 2012 1 Group communication 2 Indirect communication Communication through an intermediary with no direct coupling between the sender and the receiver(s)
More informationMulticast Quick Start Configuration Guide
Multicast Quick Start Configuration Guide Document ID: 9356 Contents Introduction Prerequisites Requirements Components Used Conventions Dense Mode Sparse Mode with one RP Sparse Mode with Multiple RPs
More informationIntegrated Services - Overview
Multicast QoS Need bandwidth/delay guarantees On many links unknown to sender Fortunately QoS development after multicast Takes multicast into account RSVP reservations from receivers toward sender rules
More informationReview. Some slides are in courtesy of J. Kurose and K. Ross
Review The Internet (IP) Protocol Datagram format IP fragmentation ICMP: Internet Control Message Protocol NAT: Network Address Translation Routing in the Internet Intra-AS routing: RIP and OSPF Inter-AS
More informationDATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book & Slides: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks
More informationFault Tolerance Part II. CS403/534 Distributed Systems Erkay Savas Sabanci University
Fault Tolerance Part II CS403/534 Distributed Systems Erkay Savas Sabanci University 1 Reliable Group Communication Reliable multicasting: A message that is sent to a process group should be delivered
More informationMulticast Communications. Tarik Čičić, 4. March. 2016
Multicast Communications Tarik Čičić, 4. March. 06 Overview One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic concepts in multicast
More informationMODELS OF DISTRIBUTED SYSTEMS
Distributed Systems Fö 2/3-1 Distributed Systems Fö 2/3-2 MODELS OF DISTRIBUTED SYSTEMS Basic Elements 1. Architectural Models 2. Interaction Models Resources in a distributed system are shared between
More informationDistributed Systems Fault Tolerance
Distributed Systems Fault Tolerance [] Fault Tolerance. Basic concepts - terminology. Process resilience groups and failure masking 3. Reliable communication reliable client-server communication reliable
More information